Click here to close now.


News Feed Item

ARAG Offers Five Tips to Help Prevent Medical Identity Theft

DES MOINES, Iowa, Feb. 4, 2014 /PRNewswire/ --You monitor your credit reports to protect your financial identity. You monitor social media to protect your online reputation. You may also want to monitor the information you routinely provide medical providers, such as your address, Social Security number and insurance provider.  The threat isn't just financial: if another person's information is mixed with yours, your medical records – and treatments – may be affected.


Medical identity theft is when someone uses another person's name and information to get medical service or make false claims. Once information is stolen a thief may see a doctor, get prescription drugs or file claims with an insurance provider.  Medical identity theft cost the healthcare industry $41 billion in 20121, with half of all healthcare organizations affected by the crime.2

While there is no way you can completely safeguard yourself against medical identity theft, ARAG®, a global provider of legal solutions, is offering a free guidebook on Identity Theft so you can learn about precautions you can take. To safeguard your medical identity, consider these tips:

  1. Be careful about sharing your health plan identification for health services that are supposed to be "free."
  2. Don't share information with anyone over the phone or by email unless you initiated the contact and know who you're dealing with.
  3. Keep paper and electronic copies of your medical and health insurance records in a safe place. Shred outdated health insurance forms, prescription and physician statements, and the labels from prescription bottles before you throw them out.
  4. If you're asked to provide personal information on a website find out why it's needed, how it will be kept safe, whether it will be shared and with whom.
  5. If you decide to share your information online, look for a lock icon on the browser's status bar or a URL that begins "https:" the "s" is for secure.

The bottom line is that you need to be aware of how prevalent identity theft is, and that anyone could be a victim. Many people choose to have a legal plan for immediate access to help in case medical or financial information is compromised. Legal plans, such as those offered by ARAG, provide access to a nationwide network of attorneys and legal resources that can help when unexpected events happen.

About ARAG:
ARAG® ( provides affordable legal solutions through trusted service to help people protect what matters most.

ARAG is the world's largest privately owned legal solutions enterprise. The company has an international premium base of nearly $2 billion and protects 15.5 million individuals and their families – worldwide. We are committed to providing our customers a choice of legal solutions to help them live a life full of opportunities.

We demonstrate expertise, integrity and passion in everything we do to serve our customers and make a positive difference in our community. We are proud to sponsor ARAG Free Will Day, providing low and middle income citizens with free access to attorneys for the creation of important legal documents to protect their family, finances and future.

ARAG's North American headquarters are based in Des Moines, Iowa. We've earned the prestigious Center of Excellence Award for six consecutive years (2007-2012) and have been awarded a Top 100 and Top 20 Call Center (2010-2011). ARAG team members voted ARAG a Best Places to Work in Insurance (2009-2012).

For more news and information about ARAG visit

Media Contact
Jen Harken
(515) 237-0271
[email protected]

1Ponemon Institute, LLC. Third Annual Survey on Medical Identity Theft. June 2012.
2Ponemon, Institute, LLC.  Third Annual Benchmark Study on Patient Privacy & Data Security. December 2012.


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and t...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Y...
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...